Received: by 2002:a05:6a10:a0d1:0:0:0:0 with SMTP id j17csp305325pxa; Wed, 12 Aug 2020 02:26:26 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxbbBkWTfuzWrBdX6P7yogG1htfoY1nEkKahjZYbr6SlYsjEPmN6Fz7JSht4LjQm8W/qxLd X-Received: by 2002:a17:906:8316:: with SMTP id j22mr29308772ejx.20.1597224386695; Wed, 12 Aug 2020 02:26:26 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1597224386; cv=none; d=google.com; s=arc-20160816; b=mESIuF3eRYXzL71YcJfeohvj0VIOfjy+TBpWcxvpa8jwVdHwgKIytvaRAQhuunmbDc FC3DOYEaAMh1UvpwuiH6P1r1iCP8Ut5Sz13FznFvz4K2RCfpCmanM+BScZo/P90Maus3 lxaWQtn9UklcmtB4HsCvzvVEbBvDF9vHc4cE64m5VUXdJlnw0ya9nsOCJPr8hz8qdJYH xmYkKZizeHNbXRcImOcEIfkF+6rlgvpMpf+tI612voLcNr0ji2Liq2NposxncFaaT1ze KDyubftzJaj/Vq9plKRV9mfwKr8nFxjTJI8wVS/iD/+dxGJapXPxCv4YSDtPKSjd+TXs +vLg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=9hlw27+QAyDvFDOZ0xuy4pyvs7jIU3OJhh819xrt9Fs=; b=slQFWZOaw73s0Ee2BHoEAwoTDw0GtfY6bHdzwMwnacS/tVut2neZpInUodRoQ5plNo 6AKDbfWw1Uk5q74q/kYrvw1fvyprh/9RfENdWM188sOvBi+610XfFe7Nz+mc5AO6xobP s9TfELxE/YlJGSd3n7Rax2H8GtCSgCYgmwQt+PeCStgIKIipJ6zLiwwYqMjjHyqzudqM iREgrmVAZ1CIJ1gg0KVwf64/QHRJZoFdamSmM9/+T5ppg+dRsj6moZHoplmjq+gRC3Ao 9MoH3lJighMUJt1Ebrkq/p+UFw3EWmbTyeCpwfuE8kWWplGNkZBQoEvwjoZ6fyt+uOk9 /iKQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=KfNPn7bD; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id l14si821426ejz.187.2020.08.12.02.25.53; Wed, 12 Aug 2020 02:26:26 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=KfNPn7bD; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726618AbgHLJWx (ORCPT + 99 others); Wed, 12 Aug 2020 05:22:53 -0400 Received: from us-smtp-delivery-1.mimecast.com ([205.139.110.120]:42895 "EHLO us-smtp-1.mimecast.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726255AbgHLJWw (ORCPT ); Wed, 12 Aug 2020 05:22:52 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1597224171; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=9hlw27+QAyDvFDOZ0xuy4pyvs7jIU3OJhh819xrt9Fs=; b=KfNPn7bDIA1Ff+5dhACm9mkiz7M15KaVYKF1TOQ9tn3QNjsZuNmfFJ2FO0WtQRqmM86xSD pvhxJhqylbzFjfbjJjMiy6X3XL57LJlfdhEvqgaQMyrFMVjzf7Q72jAkpzlXGIl0Sf/m37 HAMhvX0PeiHJ0gdUXCeKFFz7PM768+Y= Received: from mail-wm1-f70.google.com (mail-wm1-f70.google.com [209.85.128.70]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-192-ShZNlexROIWGOE06zyFzYg-1; Wed, 12 Aug 2020 05:22:50 -0400 X-MC-Unique: ShZNlexROIWGOE06zyFzYg-1 Received: by mail-wm1-f70.google.com with SMTP id z10so658985wmi.8 for ; Wed, 12 Aug 2020 02:22:49 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=9hlw27+QAyDvFDOZ0xuy4pyvs7jIU3OJhh819xrt9Fs=; b=apqA6/3cW8jWkudGzhig2U6zxN//6YlbzO7xVL3AIu6F9U3w75BGkf1CmA7xlsHBNI h2O3NvfgQ/SIzz4FouaCekux/ZDus/8ivrO0Dfu8mQPqsYSIE6K7yGvR+Ygf2s4CWH4e sh7es6WinzEJag3cs5LdKLTwtlp8/D/Ds26twKWgK2lhsA3zF5Zpp6hUnvIiSM12o+8b 9eemyw0eMp6AK/3d0SoiOFhFp7xa9/FeJCRCpKJEiKaYqJiq8MJ48Ac7ont7nfP1eFIB Rzix4U10ncKDyzrgSlscXbIoyMDZnXYbjLLtVvJQmNYkPeQZ6i/mA5U1WvWNrTjT3UPl KT7w== X-Gm-Message-State: AOAM532QvGuxfgugD/hTrM3f2gRaBLOkcLHuuhmqXBghUzEqStzK4XdE 0fKDruMVfpbpkIPLVDdCKwb2DpWeabY0NsQxTQ/iAVy1548CCjJXAy08mmHH+Ntt5TE9vA8Zix/ m//jeYk3Lzd7+7nQlONETxoE4 X-Received: by 2002:a1c:80c1:: with SMTP id b184mr8149183wmd.121.1597224168745; Wed, 12 Aug 2020 02:22:48 -0700 (PDT) X-Received: by 2002:a1c:80c1:: with SMTP id b184mr8149159wmd.121.1597224168482; Wed, 12 Aug 2020 02:22:48 -0700 (PDT) Received: from omos.redhat.com ([2a02:8308:b13f:2100:8a6a:ec88:3ed7:44b3]) by smtp.gmail.com with ESMTPSA id s19sm3668091wrb.54.2020.08.12.02.22.47 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 12 Aug 2020 02:22:47 -0700 (PDT) From: Ondrej Mosnacek To: Herbert Xu Cc: linux-crypto@vger.kernel.org, Ondrej Mosnacek , Stephan Mueller Subject: [PATCH] crypto: af_alg - fix uninitialized ctx->init Date: Wed, 12 Aug 2020 11:22:32 +0200 Message-Id: <20200812092232.364991-1-omosnace@redhat.com> X-Mailer: git-send-email 2.26.2 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org This new member of struct af_alg_ctx was not being initialized before use, leading to random errors. Found via libkcapi testsuite. Cc: Stephan Mueller Fixes: f3c802a1f300 ("crypto: algif_aead - Only wake up when ctx->more is zero") Signed-off-by: Ondrej Mosnacek --- crypto/algif_aead.c | 1 + crypto/algif_skcipher.c | 1 + 2 files changed, 2 insertions(+) diff --git a/crypto/algif_aead.c b/crypto/algif_aead.c index d48d2156e6210..9b5bd0ff3c47d 100644 --- a/crypto/algif_aead.c +++ b/crypto/algif_aead.c @@ -563,6 +563,7 @@ static int aead_accept_parent_nokey(void *private, struct sock *sk) ctx->more = 0; ctx->merge = 0; ctx->enc = 0; + ctx->init = 0; ctx->aead_assoclen = 0; crypto_init_wait(&ctx->wait); diff --git a/crypto/algif_skcipher.c b/crypto/algif_skcipher.c index a51ba22fef58f..0de035b991943 100644 --- a/crypto/algif_skcipher.c +++ b/crypto/algif_skcipher.c @@ -350,6 +350,7 @@ static int skcipher_accept_parent_nokey(void *private, struct sock *sk) ctx->more = 0; ctx->merge = 0; ctx->enc = 0; + ctx->init = 0; crypto_init_wait(&ctx->wait); ask->private = ctx; -- 2.26.2